[{"term":"221","id":0,"type":"QUICKLINKS"},{"term":"Notas de aplicación","id":1,"type":"QUICKLINKS"},{"term":"Bibliotecas de automatización en edificios","id":2,"type":"QUICKLINKS"},{"term":"WAGO-I/O-PRO","id":3,"type":"QUICKLINKS"},{"term":"Edificio","id":4,"type":"QUICKLINKS"}]
[{"url":"/ciberseguridad","name":"Ciberseguridad","linkClass":"active","categoryCode":null}]

Seguridad con WAGO

Cifre sus datos de máquina de forma segura con WAGO

Dentro de la automatización, los procesos de fabricación optimizados abanderan muchos nuevos modelos de negocio en el contexto de la digitalización. Independientemente de si las máquinas se externalizan o la comunicación se produce entre varias plantas de producción, es inevitable que los datos de máquina no permanezcan durante más tiempo en el lugar en el que se generan y, en su lugar, abandonen la fábrica por múltiples vías.

Cybersecurity Made by WAGO

For many years, machine data was only evaluated and used in the manufacturing facility in which it was generated. Thus, the risk of unauthorized data access was relatively low. Use of classic defense-in-depth measures ensured that machine data was well protected.

WAGO’s PFC100 and PFC200 Controllers encrypt information directly in the controller and subsequently transmit the data to the cloud via IPsec or OpenVPN. This ensures that machine data is optimally protected against unauthorized access.

Step-by-step to the solution:

  • Previously: Data remained in the manufacturing hall.
  • Digitalization: Defense-in-depth carries risks.
  • The solution: Data encryption happens in the controller.
Loesungen_Cyber_Security_2000x2000.jpg

White Paper: IT Security in Production Facilities

Cyber attacks on automation systems and critical infrastructure are increasing. How can companies protect effectively against cyber attacks?

Our white paper “IT Security in Production Facilities – An Introduction for Small and Medium-Sized Enterprises” has answers. Read about how you can achieve optimal protection of your systems with an integrated approach with “defense in depth.”

The core content of the white paper includes:

  • Standards that play a role in the area of IT security
  • Ten point plan for protection against cyber attacks
  • Requirements on future automation systems
digitalisierung_cyber-security_rechnerkabel_mann_tablet_GettyImages-513087873_1_2000x2000.jpg